Error message

  • Notice: unserialize(): Error at offset 37 of 38 bytes in variable_initialize() (line 1184 of /home/blake/sites/
  • Notice: unserialize(): Error at offset 109 of 929 bytes in variable_initialize() (line 1184 of /home/blake/sites/
  • Notice: unserialize(): Error at offset 109 of 881 bytes in variable_initialize() (line 1184 of /home/blake/sites/


Why Your Email May Become Unusable

According to an article at Wired News, SPAM is increasing at such a rapid rate that it may render email unusable in as little as six months. There\'s even a link to a map that illustrates how SPAM is spread through a type of technological incest. Read More.


The Digital Drak Age

Here\'s One From Shift that says we need to transform some of our ideas about computing in order to preserve what we are creating now, for the future. They say We need a new universal storage mechanism: one that authenticates, protects and manages the data we create. In a future-conscious world, such functions would be a natural extension of the computing experience.


In Remote Library Stacks, an All-Seeing, Scanning Robot

Here\'s One from The NYTimes on libraries of the future, partially run by by robotic systems linked to the Internet.
They now have a robot that can move about inside a library and locate a book requested by a user, take it off the shelf and carry it to a nearby scanning station. In the system\'s envisaged final version, a second robot at the scanning station would scan specific pages of the book that the user was interested in. The user would then be able to leaf through the book over the Internet from any location.

This project is over at Johns Hopkins, and has A Web Site.


Study: Open, closed source equally secure Has A Story on a paper from computer scientist Ross Anderson that used an analysis equating finding software bugs to testing programs for the mean time before failure, a measure of quality frequently used by manufacturers. Under the analysis, Anderson found that his ideal \"open-source\" programs were as secure as the \"closed-source\" programs.

Not 100% library related, but it goes well with Ben\'s Great Story.


Copryright, secuity, and other hobgoblins

An interesting and simple overview of the security and copyright issues shaping the future of the Web:

Today, the Internet is messy, dangerous ground. Viruses and system break-ins are on the rise, while vested interests battle over what isn\'t allowed.

Millions of corporate dollars are fueling a fight to control what consumers can view or listen to, how many times, in what format and over what type of connection. Lawyers are suing, lobbyists are lobbying and policymakers are grasping to figure out what role government should play.

Full article.


This just in: Librarians dig Linux and Open Source

Some clueless reporter has just posted an article on NewsForge about the ALA convention. You can tell by the title, \"Quiet Revolution\", that it\'s going to be goggle-eyed at the prospect of librarians wielding anything more technological than a stapler.

Well, actually, it\'s not that bad. But I felt I had to castigate the author for such a dumb title. And I figured that a dose of humility would be welcome along with such a blatant bit of self-promotion: I GOT PUBLISHED! WOO-HOO! And now back to the usual Fair and Unbiased Reporting you\'ve come to expect from this bunch.


First-Ever Survey of Technology Use by Library and Museum Professionals

Gary Price writes \"Institute of Museum and Library Services
Survey Results Released: The Status of Technology and Digitization in the
Nation\'s Museums and Libraries
From the news release, \"A federal report quantifies, for the first time,
how computers, software, and information sharing technologies are changing
the work of museums and libraries. The federal Institute of Museum and
Library Services surveyed more than 700 professionals in libraries and
museums of all types and sizes about their technology use and digitization
activities.\" Announcement/Summary of Key Findings available Here or Here [PDF].\"


\'Copy-proof\' CDs cracked with marker pen

jen writes \"The pen is mightier than the computer! \'Copy-proof\' CDs cracked with marker pen
CNN Story
on how technology buffs have cracked music publishing giant Sony Music\'s elaborate disc copy-protection technology with a decidedly low-tech method: scribbling around the
rim of a disk with a felt-tip marker. \"



Ever wonder how to combine faceted classification, regarded as a \"bottom-up\" metadata system, with the hierarchical navigation that\'s typically considered a \"top-down\" structure -- thereby giving (unsuspecting) users much more power over their browsing?

Well, now there is FacetMap, a solution so simple that we can take any metadata you\'ve got, and turn it into a browsing system right there on the servers. Every page is generated when you request it, in order to display the efficiency of our unique technology.


Microchips in Books Speed Check-Out

Wired has a nice little story on RFID technology. Although originally designed for security, these \"tags\" which are a combination of microchip and radio antenna, have a number of benefits within the library. Self-checkout is quicker and a shelf can be easily scanned to check its contents. Also check-out(ouch!) UK Bookstores\' plans for RFID



Subscribe to Technology